Closed jcortejoso closed 7 months ago
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.
Coverage from tests in ./e2e_test/...
for ./consensus/istanbul/...
at commit 346c5b3f771fc7cb2f58fdb1a702e86b76c174cf
coverage: 63.4% of statements in consensus/istanbul coverage: 42.9% of statements in consensus/istanbul/announce coverage: 55.8% of statements in consensus/istanbul/backend coverage: 0.0% of statements in consensus/istanbul/backend/backendtest coverage: 24.3% of statements in consensus/istanbul/backend/internal/replica coverage: 61.1% of statements in consensus/istanbul/core coverage: 50.0% of statements in consensus/istanbul/db coverage: 0.0% of statements in consensus/istanbul/proxy coverage: 64.2% of statements in consensus/istanbul/uptime coverage: 51.8% of statements in consensus/istanbul/validator coverage: 79.2% of statements in consensus/istanbul/validator/random
Test failures: |
---|
TestEthersJSCompatibilityDisableAfterGingerbread: e2e_test
|
This test report was produced by the test-summary action. Made with ❤️ in Cambridge. |
Description
This PR include two changes to container CI workflows:
Remove the
build-sign-binaries.yaml
workflow: This workflow/release relied on xgo compilation, that relied on removed dependencies (https://github.com/karalabe/xgo). This release would be needed for Android/iOS releases, but as longer as it is not supported by upstream go-ethereum right now, we'd need to figure out and replace dependencies to build it again. Removing the workflow until we work on this refactor.Update the container CI workflow version, and enable
trivy
scan so CVE reports are available under the security tab.